Browse Publications Technical Papers 2019-01-0476

CAN Bus Message Electrical Signatures for Automotive Reverse Engineering, Bench marking and Rogue ECU Detection 2019-01-0476

There are many applications in which you may need to reverse engineer the Controller Area Network (CAN), e.g.: • Automotive competitor analysis • Telematics applications such fleet management • Disabled driver applications The typical reverse engineering process is concerned with moving a sensor and watching the CAN bus for message changes. For example, wind down a door window and see if this kicks off changes in CAN message data. Many CAN buses have many messages originating from many Electronic Control Units (ECUs). This means it is difficult to watch all of them at the same time. It would be far easier if you could simply watch a smaller number of CAN messages to observe changes by isolating the ECUs the messages originate from. This paper/article describes a process that allows the user to identify which CAN messages are transmitted by a particular ECU. This is achieved by getting the electrical signature of each CAN message and matching known CAN messages with unknown ones. Therefore, the transmitting ECU of the unknown CAN messages can be determined. The method for determining which Identifiers come from a particular ECU is to first get electrical signature plots of known diagnostic response messages and compare with electrical signature plots of the real time control messages. We show how to achieve this using a CAN bus analyser coupled with a PC oscilloscope. This paper requires prior basic knowledge of the workings of the CAN bus technology.


Subscribers can view annotate, and download all of SAE's content. Learn More »


Attention: This item is not yet published. Pre-Order to be notified, via email, when it becomes available.
Members save up to 40% off list price.
Login to see discount.
Special Offer: With TechSelect, you decide what SAE Technical Papers you need, when you need them, and how much you want to pay.